Producing 3D video sequences from 2D input video. The project will develop new methods for extracting 3D information from existing films so that they may be used with 3D television monitors marketed by the industrial partner, Dynamic Digital Depth. The 3D representation will allow existing video material such as existing films, TV programs and news video to be viewed in 3D on a suitable 3D TV monitor. This will give a boost to the acceptance of 3D television and film as a preferred medium. Ex ....Producing 3D video sequences from 2D input video. The project will develop new methods for extracting 3D information from existing films so that they may be used with 3D television monitors marketed by the industrial partner, Dynamic Digital Depth. The 3D representation will allow existing video material such as existing films, TV programs and news video to be viewed in 3D on a suitable 3D TV monitor. This will give a boost to the acceptance of 3D television and film as a preferred medium. Expected outcome is a software system that will speed the conversion of 2D video to a 3D representation through automatic and interactive analysis techniques.Read moreRead less
Through Walls Collaboration to Support Command and Control Operations with Eyes and Ears in the Field. Australia is a geographically dispersed country with locations of high concentrations of technology resources. Australia requires the ability to gather real time intelligence information in the field to support planning and operational decisions by a command team for military and civil defence operations. Currently Australia supports such operations in remote areas of the country and numerous o ....Through Walls Collaboration to Support Command and Control Operations with Eyes and Ears in the Field. Australia is a geographically dispersed country with locations of high concentrations of technology resources. Australia requires the ability to gather real time intelligence information in the field to support planning and operational decisions by a command team for military and civil defence operations. Currently Australia supports such operations in remote areas of the country and numerous overseas operations. A major research outcome is the design and development of interaction techniques for the mobile users in through walls collaboration systems to control and manipulate augmented reality information in the field across a number of application domains, such as medical, maintenance, military, search and rescue, and GIS visualization.Read moreRead less
Crisis management simulation: developing a methodology for transforming communication response. The ability of any large corporation or public institution to handle a crisis can have major economic, environmental, social or cultural consequences. For the Australian Defence Force (ADF), effective crisis management communication can literally mean life or death. This project merges cutting-edge digital games technology with applied drama techniques to produce a crisis management game to simulate ....Crisis management simulation: developing a methodology for transforming communication response. The ability of any large corporation or public institution to handle a crisis can have major economic, environmental, social or cultural consequences. For the Australian Defence Force (ADF), effective crisis management communication can literally mean life or death. This project merges cutting-edge digital games technology with applied drama techniques to produce a crisis management game to simulate conflict and crisis scenarios. Working closely with the ADF to better understand organisational communication under extreme pressure, this new approach will build teamwork and break down barriers to effective crisis management. The methodology developed will have global application to public and private organisations.
Read moreRead less
Reducing the risks associated with developing large-scale, critical software-integrated systems. Industry, government and defence increasingly rely on large-scale, critical software-integrated systems. The scale and complexity of these systems means current methods of analysing, designing and assuring their dependability are struggling to provide the constructive support and assurance that is demanded. Consequently, there are significant risks of cost and schedule overruns and of system problems ....Reducing the risks associated with developing large-scale, critical software-integrated systems. Industry, government and defence increasingly rely on large-scale, critical software-integrated systems. The scale and complexity of these systems means current methods of analysing, designing and assuring their dependability are struggling to provide the constructive support and assurance that is demanded. Consequently, there are significant risks of cost and schedule overruns and of system problems and failures. This project builds on results from our current collaboration - a new method for modelling, analysis and defect detection for the requirements of large-scale systems. We will develop and scale-up to industry strength, simpler, more powerful, strategies for analysing, designing and providing the high level of assurance required.Read moreRead less
Information Security Evaluation of Embedded Computer Software. Safeguarding classified electronic communications is of major national importance. This research, into security evaluation of computer software, is supported by the Defence Signals Directorate, which verifies the security of communications devices used by Australia's government and armed forces. As such devices become increasingly sophisticated, traditional security evaluation techniques have become unacceptably difficult and costl ....Information Security Evaluation of Embedded Computer Software. Safeguarding classified electronic communications is of major national importance. This research, into security evaluation of computer software, is supported by the Defence Signals Directorate, which verifies the security of communications devices used by Australia's government and armed forces. As such devices become increasingly sophisticated, traditional security evaluation techniques have become unacceptably difficult and costly. Hardware evaluation techniques, based on tracing paths through circuitry diagrams, have proven unsuitable for software evaluations. Consequently, devising new tools and techniques for information security evaluation of embedded computer software is essential for preserving Australia's national security.Read moreRead less
Remote Delivery and Capture of Payloads using Aerial Deployed Tethers. The capability to rapidly transport payloads to and from remote locations is critical for search and rescue, disaster relief, remote communities, and military operations. Conventional technology is not well suited to this role, hence we propose to develop an intelligent system to manoeuvre a tether, towed from an aircraft, to pick-up or set-down a payload, with zero surface velocity. Because of the complex, nonlinear dynamics ....Remote Delivery and Capture of Payloads using Aerial Deployed Tethers. The capability to rapidly transport payloads to and from remote locations is critical for search and rescue, disaster relief, remote communities, and military operations. Conventional technology is not well suited to this role, hence we propose to develop an intelligent system to manoeuvre a tether, towed from an aircraft, to pick-up or set-down a payload, with zero surface velocity. Because of the complex, nonlinear dynamics of a cable-body system, advanced modelling and nonlinear optimal control will be applied in this task. The resulting world-first system will provide important economic opportunities and demonstrate Australian scientific capacity for novel developing intelligent systems.Read moreRead less
Building dependability into complex, computer-based systems. Air traffic control, telecommunications, defence, power distribution and many other vital infrastructures all rely on complex computer-based systems. Whenever one of these systems fails, it can cause major disruption to society, create large financial losses and even pose risks to life.
This project will integrate and improve methods for modelling and analysing computer-based systems in terms of their requirements and architectures ....Building dependability into complex, computer-based systems. Air traffic control, telecommunications, defence, power distribution and many other vital infrastructures all rely on complex computer-based systems. Whenever one of these systems fails, it can cause major disruption to society, create large financial losses and even pose risks to life.
This project will integrate and improve methods for modelling and analysing computer-based systems in terms of their requirements and architectures, focusing on how to achieve and maintain dependability in the context of on-going change and failure to meet requirements. These methods will be based on sound mathematical foundations and proven engineering approaches applicable to industrial-scale complex systems.Read moreRead less
Defence and Security Risk Assessment using Agent Based Distillations. Today's society continues to be occupied with the idea of risk. The recent events of September 11th, the Bali bombing, SARS, the bush fires in Canberra, and the Tsunami are examples of human-made and natural disasters. These events had dramatic consequences on the social, economic, and political environment and numerous industries. This project offers an innovative methodological paradigm for assessing risk through the transfe ....Defence and Security Risk Assessment using Agent Based Distillations. Today's society continues to be occupied with the idea of risk. The recent events of September 11th, the Bali bombing, SARS, the bush fires in Canberra, and the Tsunami are examples of human-made and natural disasters. These events had dramatic consequences on the social, economic, and political environment and numerous industries. This project offers an innovative methodological paradigm for assessing risk through the transfer of technologies drawn from defence simulations to the safety and security areas. The success of this project will mark a paradigm shift in the area of risk assessment and management.Read moreRead less
A hardware accellerated platform for high-fidelity, high speed simulation of infrared scenes. Missiles present a major military and terrorist threat to aircraft and ships. A possible method to detect them is an infrared imaging system which is sensitive to a missile's spectrally unique rocket propulsion exhaust. It is both dangerous and expensive to conduct field trials; so simulation is used extensively. This project aims to use high performance computing to accelerate the slowest parts of the ....A hardware accellerated platform for high-fidelity, high speed simulation of infrared scenes. Missiles present a major military and terrorist threat to aircraft and ships. A possible method to detect them is an infrared imaging system which is sensitive to a missile's spectrally unique rocket propulsion exhaust. It is both dangerous and expensive to conduct field trials; so simulation is used extensively. This project aims to use high performance computing to accelerate the slowest parts of the industrial partner's existing simulations: the generation of simulated infrared images.
This project will improve the competitiveness of the manufacturer of infrared threat and warning systems and provide research training in an area of high performance computing.
Read moreRead less
A Scalable Theory of Behavior Composition for Practical Engineering Models of Human Performance. Minimizing human error and maximizing human performance is a major design goal in safety critical systems. The development of methods for affordable human performance modeling has widespread applicability for evaluating user-system interfaces. The compositional method explored here has been shown to make accurate predictions reduce model development time by an order of magnitude. Large safety critica ....A Scalable Theory of Behavior Composition for Practical Engineering Models of Human Performance. Minimizing human error and maximizing human performance is a major design goal in safety critical systems. The development of methods for affordable human performance modeling has widespread applicability for evaluating user-system interfaces. The compositional method explored here has been shown to make accurate predictions reduce model development time by an order of magnitude. Large safety critical applications, such as military or air traffic control systems, would benefit greatly. The proposed work tests whether the compositional methods will scale to more complex domains. The work will be coordinated with Australian industry, academia, and government research efforts.Read moreRead less